Examining Social Engineering In Computer Security


Examining Social Engineering In Security


Let’s talk about Social Engineering


Do you that some of us are not aware of the danger of social media or social engineering. As good as social media is, it has its own bad side. You should not ignore this negative side if you truly want to be safe online. That is why I want to focus on the concept of social engineering in this article.


I have always been mentioning the concept of social engineering or identity theft from my previous articles.  It is an act of using another identity to perpetrate a crime on social media.
In playing online games,  the attacker may trick the unsuspecting person to install software that will expose their devices to attacks. This will allow the attacker to steal information from the victim’s device. 

Online exchange as part of Social engineering…
They can also assist or offer to help in winning the game in exchange for other player’s password or other information that are available in the game forum. That is why you have to be very careful of what you disclosed in forums or social media. This will prevent you from being a victim of social engineering. It is been observed that gamers who want to win always respond to their offers. 

Phishing as part of social engineering…
The next thing is that attackers send phishing emails supposedly from the game server administrators, which will invite the player to authenticate his or her information via a website linked to the message. Now are connected to an infected website.


cyber prostitution and cyber mugging


A closer look at cyber prostitution…

In this article, I want to talk about how to be free from cyber prostitution and mugging. To many of us out there, these are terms that you are not familiar with, I want to tell you that by the time I explained what it is, you will realise that you have always been a victim. Let us begin that discussion now.

Let’s enter the discussion on cyber prostitution…

Before I delve into my discussion on cyber prostitution, I feel you should know about the protection scheme when you are engaged in online gaming.
Examining Social Engineering In Security
Also, a protection scheme is online bullying that is very common in South Korea. Under these, online gamers are forced to enter into a protection scheme. In this protection scheme, the gamer will have to pay so that their favourite game characters will not be eliminated. 
Online games have also become a medium for cyber prostitution. It happens when gamers pay in order to have cyber sex. 

This is an excerpt from Wikipedia…
Cybersex or cyber prostitution, also called computer sexInternet sexnetsex and, colloquially, cyber or cybering, is a virtual sex encounter in which two or more people connected remotely via computer network send each other sexually explicit messages describing a sexual experience.
In one form, this fantasy sex is accomplished by the participants describing their actions and responding to their chat partners in a mostly written form designed to stimulate their own sexual feelings and fantasies.
In Sims online, a Massively Multiplayer Online Game, a 17-year-old developed a cyber brothel where gamers paid Sim money called Simoleans in order to have cybersex per minutes. The gamers account were eventually cancelled. 

Virtual mugging as part of cyber-prostitution…
Virtual mugging was coined when some players on Lineage II used bots to defeat other gamers and take their items. These items were later put to sale in an online auction. 

Now your take on this argument.

We would also like to hear what you feel about the topic we discussed today. Your feedback is very important to us. Feel free to drop your comments and recommendations. If you have a contrary opinion, you can drop that too.


You can also join our Facebook Page CRMNigeria for more updates. You can do that by clicking on the link or searching for our page on Facebook.


Action Point.
You need to confirm your subscription by clicking on the link sent to you. You can check the spam folder for it. Add us to your mailing list to receive directly from us.


PS: Click on the link below to sign up for my Online E-Course CRM Training. Make sure you confirm your subscription by clicking on the link sent to you. Thanks.

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

As you found this post useful...

Follow us on social media!

We are sorry that this post was not useful for you!

Let us improve this post!

Tell us how we can improve this post?

Adeniyi Salau Scrum Master Certified , CCNA R&S , BeingCert and Scrum Certified Digital Marketing Professional, CEP, MOS, MCP, CSCU (Project 2016), Microsoft Certified Security and Networking Associate is a Google and Beingcert Certified Digital Marketer, Project Manager and SEO Expert of repute with about a decade of Blogging and online marketing experience. He is always ready to share his experience with others.


  1. I am really happy reading this nice and awesome content.I am waiting for your new Post and please give me update when you publish new one .Thanks for your article.

Leave a Reply

Your email address will not be published. Required fields are marked *


CommentLuv badge
%d bloggers like this: